With the rapid development of mobile internet and the explosive growth of intelligent mobile terminals, microblog has become indispensable in many people's daily life but also bring overload information. A recomme...
详细信息
With the rapid development of mobile internet and the explosive growth of intelligent mobile terminals, microblog has become indispensable in many people's daily life but also bring overload information. A recommender system is needed but the traditional collaborative filtering recommendation algorithm is suffered from two main problems here: data sparsity and user relationship influence. In this paper, we proposed an improved collaborative filtering algorithm based on community detection for microblog recommendation. We apply the community detection algorithm to analysis the structure of the user relationship network in microblog before we do the recommendation. We make some adjustments to help the collaborative filtering algorithm works better in the community based system. Results of experimental evaluation demonstrate that in a microblog network, our algorithm remarkably outperforms the traditional collaborative filtering scheme by enhancing the recommendation accuracy.
With the continuous development of multimedia technology, images in the real word and the internet become more widespread, which brings unprecedented convenience to people's communication. However, the behavior of...
详细信息
With the continuous development of multimedia technology, images in the real word and the internet become more widespread, which brings unprecedented convenience to people's communication. However, the behavior of image tampering will brings disastrous consequences. images could be forged using different techniques, and the most common forgery is copy-move forgery, in which a part of an image is duplicated and placed elsewhere in the same image. In this paper, we propose an improved scale invariant feature transform (SIFT)-based copy-move detection method, which combines broad first search neighbors (BFSN) clustering and color filter array (CFA) features. BFSN clustering algorithm is applied to detect multiple copied areas in tampered images. In order to distinguish original regions from tampered regions, we take CFA features into consideration to discover the inconsistency at the edges of the copied regions. Experiments demonstrate the efficiency of this method on different forgeries and quantify its robustness and sensitivity.
Over the last few years, development of internet and technology of media, the protection of copyright have become very important. To protect multimedia data against illegal copying and transferring, the insertion of a...
详细信息
ISBN:
(纸本)9781479938254
Over the last few years, development of internet and technology of media, the protection of copyright have become very important. To protect multimedia data against illegal copying and transferring, the insertion of a signal (digital signature, watermark) has become a duty without modifying quality of the original image, the goal of this operation is to identify the owner and protect his intellectual property. Digital watermarking has been proposed as a solution to solving the copyright problem by introducing invisible data (watermark) into original image. In this paper, we propose a study of digital images watermarking. This study is achieved by inserting watermark in different coefficients of DWT (LH, HL, HH) using SVD transform by searching the optimal block that have the maximum entropy which can be used to insert the watermark in original image. The experimental results show the different results of PSNR for each coefficient of DWT and the robustness against most attacks.
In visual surveillance systems, the image foreground object detection must face the problems of moving backgrounds, illumination changes, chaotic scenes, etc. in real word applications. The most used and accurate meth...
详细信息
ISBN:
(纸本)9781479978915
In visual surveillance systems, the image foreground object detection must face the problems of moving backgrounds, illumination changes, chaotic scenes, etc. in real word applications. The most used and accurate methods are mostly pixel-based, taking up more memory and requiring longer execution time. This paper presents a cluster color background model that possesses efficient processing and low memory requirement in complex scenes. Our proposed approach consumes 32.5% less memory and increases accuracy by at least 2.5% compared to other existing methods. Last, implementing the object detection algorithm on the 2.83GHz CPU, we can achieve 26 frames per second for the benchmark video with image size 768×576.
In the modern era of computer vision technology, gait biometric trait increases the proliferation of human identification in video surveillance situation. This paper intends to discuss the robustness of gait identific...
详细信息
In the modern era of computer vision technology, gait biometric trait increases the proliferation of human identification in video surveillance situation. This paper intends to discuss the robustness of gait identification irrespective of small fluctuation in subject's walking pattern. The Gait Energy image (GEI) is computed on silhouette gait sequences obtained from OU-ISIR standard gait database. The advantage of working with GEI is to preserve the shape and motion information into a single averaged gait image with fewer dimensions. The three independent components such as head node, body torso and leg region are separated from subject's GEI in accordance to body segment ratio. The local biometric feature has been computed from the shape centroid to the boundary points of each segment. The normality testing of feature for each region of GEI body frame ascertains the discriminative power of each segment. The similarity measurement between gallery and probe gait energy image has been computed by cosine distance, correlation distance and Jaccard distance. The performance efficiency of different distance based metrics is measured by several error metrics.
Computed tomography is an imaging modality which is widely used in medical imaging nowadays. The main disadvantage of this technique is the prolonged radiation exposure which causes the problem to patients and reprodu...
详细信息
Computed tomography is an imaging modality which is widely used in medical imaging nowadays. The main disadvantage of this technique is the prolonged radiation exposure which causes the problem to patients and reproduced images. Proposed method reduces the exposure time, by limiting the number of projections and reconstructs good quality image. The method combines Simultaneous Algebraic reconstruction technique (SART) and total variation (TV) with Bregman iteration. Bregman iteration improves contrast and increases signal to noise ratio. The numerical results explain the efficiency of proposed work in evaluation with other existing methods.
Since the 1970, object recognition technologies have matured to a point at which exciting applications are becoming possible for visual substitution. In fact, industry has created a variety of computer vision products...
详细信息
Since the 1970, object recognition technologies have matured to a point at which exciting applications are becoming possible for visual substitution. In fact, industry has created a variety of computer vision products and services by developing new electronic aids for the blind in order to overcome the difficulties that the dog and cane do not respond. This paper provides an overview of various visual substitution systems developed in the recent years. It aims also to introduce a proposed method that restores a central function of the visual system which is the identification of surrounding objects. This method is based on video analysis and interpretation. Thus, our contribution is to present a visual substitution system based on evaluating fast and robust algorithms to recognize and locate objects in images.
A novel image retrieval method using color-spatial histograms is presented in this paper. The new method contains three phases. First, we quantize the color space by Gaussian mixture model. Second, the color-spatial h...
详细信息
ISBN:
(纸本)9781479954599
A novel image retrieval method using color-spatial histograms is presented in this paper. The new method contains three phases. First, we quantize the color space by Gaussian mixture model. Second, the color-spatial histograms generated for both the query image and the images in the database based on the quantized color components and the improved spatiogram method. Finally, using color-spatial histogram as features, we compare the query image with images in the database by Jensen-Shannon divergence. Our proposed method's availability is demonstrated by the experimental assessment on the COREL image database.
Inpainting is an art of restoring damages or removal and filling in removed region. Exemplar-based techniques simply fill target region iteratively using best matching patch from rest of the image. An important part o...
详细信息
Inpainting is an art of restoring damages or removal and filling in removed region. Exemplar-based techniques simply fill target region iteratively using best matching patch from rest of the image. An important part of this model is data term which decides order of filling procedure. In most of the methods, data term depends on strength of an isophote which is found from gradient operator. Gradient operator is a poor numerical differentiation based approximation of edges. In this paper, a new data term is proposed which is based on gradient obtained by application of Infinite size Symmetric Exponential Filter (ISEF). ISEF is a one-step based multi-edge model which detects edges by differentiation of optimal exponential and obtained edges help to preserve structure information. New ISEF based data term improves ordering of patches and helps preventing linear and curved structures. Proposed method has been applied to various images containing structure and composite structure. It can be seen that proposed method produces comparable results. Experimental results show that proposed method not only improves visual quality but also improves Peak signal-to-Noise Ratio (PSNR) which is considered as a quantitative measure.
With the rapid development of the embedded system, semiconductor technology and image processing, the embedded image processing has found widespread acceptance in mobile applications like video streaming, smart camera...
详细信息
With the rapid development of the embedded system, semiconductor technology and image processing, the embedded image processing has found widespread acceptance in mobile applications like video streaming, smart cameras, target tracking, vehicle navigation, smart traffic light systems and Biometrics. The implementation of image processing algorithms is computationally intensive and resource exhaustive. The system engineer has a mandate to optimize these algorithms so as to meet real time deadlines on an embedded processor. The designed system implements different real time image processing algorithms such as LPF, HPF, Threshoding, Template Matching on WINDOWS-XP and verified on WINDOWS 7 using Microsoft Visual Studio IDE VC++, further algorithms are implemented on Linux real time operating system(RTOS). The system uses the code optimization method to improve execution time for Viola Jones face detection algorithm. The design and implementation of real time image inspection system is based on the BeagleBoard-xM, a low cost ARM processor. This approach reduces size, efficiency, cost, time and power consumption etc. for Industrial control system based on real time image inspection system.
暂无评论